A tour monitor system includes a portable tour monitor and a central programming/report generating computer. The tour monitor includes a bar code reader, an alphanumeric display, and an alphanumeric keyboard. The tour is organized into zones, each including a set of checkpoints, wherein each checkpoint is labeled by a bar code. The tour monitor is programmed to prompt the guard through the tour by displaying the names of successive zones. In addition, individual checkpoints can be designated as higher or lower priority checkpoints, and the tour monitor is programmed to alert the guard if higher priority checkpoints are missed, and to require the guard either to scan the missed higher priority checkpoint or to provided an override signal. The tour monitor also allows the guard to enter alphanumeric messages which are stored in combination with the scanned checkpoint codes in a log. This log is then transmitted to the programming/report generating computer for analysis. Preferably, reports are organized in terms of zones, and reports specifically highlight higher priority checkpoints which were missed. By organizing the tour into zones and checkpoints, the tour monitor can be programmed more efficiently.

Patent
   5120942
Priority
Feb 02 1989
Filed
Feb 02 1989
Issued
Jun 09 1992
Expiry
Jun 09 2009
Assg.orig
Entity
Large
50
10
all paid
1. A portable tour monitor comprising:
a modular, portable device adapted to be carried through a tour, said tour comprising a plurality of checkpoints, each labeled with a respective checkpoint code;
sensor means, included in the portable device, for reading the checkpoint codes during the tour and for generating time stamped sensor signals in response thereto;
memory means for storing the time stamped sensor signals;
means for storing a plurality of messages, each associated with a respective one of a plurality of successive zones included in the tour, each of the zones associated with a set of the checkpoints of the tour, at least some of the sets comprising a plurality of checkpoints; and
means, included in the portable device, for indicating when the sensor means has read at least selected ones of the checkpoint codes associated with a selected zone; and
means, responsive to the indicating means, for displaying the message associated with the next successive zone.
2. The invention of claim 1 wherein at least some of the checkpoints are each associated with a plurality of the zones.
3. The invention of claim 2 wherein each of the checkpoint codes comprises a respective bar code.
4. The invention of claim 1 further comprising means for tranmitting the stored time stamped sensor. signals from the portable device to a report generating computer.
5. The invention of claim 1 wherein each of the checkpoints comprises a security checkpoint, and wherein the tour is a guard tour.
6. The invention of claim 1 wherein each of the checkpoints comprises a janitorial checkpoint, and wherein the tour is a janitorial tour.
7. The invention of claim 1 wherein each of the messages names the associated zone.

This invention relates to an improved tour monitor system that can be used for example by a guard or night watchman to record the time at which various checkpoints on a tour are checked by the guard.

Tour monitors have advanced significantly since the early mechanical clocks which used paper tape recording systems to time stamp events of a tour. One class of modern tour monitors includes a bar code reader in a portable, hand-held device. Bar code labels are attached to each checkpoint along the tour, and the tour monitor includes means for recording consecutive bar code readings along with a time stamp for each reading. At the end of the tour, the recorded list of bar code readings and time stamps can then be transmitted to a report generating computer.

Such tour monitors offer certain advantages, particularly in that the checkpoint labels can be made inconspicuous and inexpensive to attach and the associated reports can be generated in a flexible format that is easy to use. However, tour monitors of the type described above provide few additional operational features for the guard beyond those provided by the original mechanical clock systems.

The present invention is directed to an improved tour monitor and associated programming and report generating system that improve the efficiency with which the tour monitor can be programmed, the efficiency with which the guard or other service individual can use the tour monitor, and the usefulness of reports generated to summarize the monitored tours.

The tour monitor system described below provides a number of important new features which cooperate to provide a particularly efficient system. Of course, it is not necessary in all applications that all of these features be used together, and selected ones of the features can be used alone or in various subcombinations in some applications.

The tour monitor of this invention includes a modular, portable device which is adapted to be carried through a tour which comprises a plurality of checkpoints, each labelled with a respective checkpoint code. This portable device includes sensor means for reading the checkpoint codes during the tour and for generating time stamped sensor signals in response to these codes. The device also includes memory means for storing the time stamped sensor signals.

A first feature of this invention relates to a system for prompting the user of the tour monitor to move through the tour. According to this first feature, a tour monitor of the type described above is provided with means for storing a plurality of messages, each associated with a respective one of a plurality of successive zones included in the tour, wherein each of the zones is associated with a set of the checkpoints of the tour. The portable device includes display means operative when the sensor means has read selected checkpoint codes associated with a selected zone for displaying the message associated with the next successive zone. In this way, the guard or other user of the tour monitor is prompted to move from one zone to the next. This makes it easier for a new guard or other user of the tour monitor to conduct an unfamiliar tour, and it reduces inefficiencies associated with the need for an experienced guard to learn a new tour.

According to a second feature of this invention, a portable tour monitor of the general type described above is provided with means for designating first ones of the checkpoints of the tour as higher priority checkpoints and second ones of the checkpoints of the tour as lower priority checkpoints. A sequence of sets of checkpoint signals is stored, preferably in the portable tour monitor itself, along with means for comparing the sensor signals with the checkpoint signals and for displaying a warning message when the sensor signals indicate that one of the higher priority checkpoints has been missed in the sequence.

This feature of the invention alerts the guard or other user of the tour monitor when a higher priority checkpoint has been missed. In the preferred embodiment described below, the guard has the choice of either scanning the missed checkpoint or commanding an override of the warning message. This allows a supervisor reviewing the tour monitor log to be certain that a higher priority checkpoint was not inadvertently missed or forgotten. Furthermore, this feature allows checkpoints to be divided into higher and lower priority checkpoints, thereby increasing flexibility to the guard in conducting the tour.

According to a third feature of this invention, a tour monitor of the general type described above is provided with an alphanumeric keyboard which generates alphanumeric key signals. Means are provided for storing the alphanumeric key signals in association with selected time stamped sensor signals. This feature of the invention allows the guard or other user of the tour monitor to write alphanumeric messages into the log maintained by the tour monitor. For example, the guard can record the name of an unexpected person found at one of the checkpoints during the tour. In this way, the need for hand written notes or other supplements to the log can be largely eliminated.

The tour monitor described in detail below is programmable, and a computer system is provided for programming the tour monitor for a tour According to a fourth feature, this programming device includes means for storing a plurality of user definable zone records. Each zone record comprises a set of checkpoint entries, and one or more of these sets comprise a plurality of checkpoint entries. Each checkpoint entry in turn comprises a checkpoint code associated with a respective checkpoint. The programming device of this invention includes means for creating a tour defining record comprising a user selectable plurality of zone records, and means for transmitting the tour defining record to a programmable tour monitor.

Because the programming device organizes the checkpoint entries into zone records, the tour defining record can be assembled quickly and efficiently by a user who simply selects the desired zone records to make up a tour. Once the zone records have been defined, the user often does not need to enter individual checkpoint entries when a tour defining record is to be modified, as, for example, when one zone is substituted for another.

Once a tour has been completed and a tour monitor of the type described above has generated a tour log, the tour monitor report generating system of this invention can be used to generate reports for later analysis. According to a fifth feature of the invention, such a tour monitor report generating system includes means for receiving a log from a tour monitor, wherein the log comprises a plurality of time stamped sensor signals, at least some of the sensor signals associated with respective checkpoint codes associated with respective checkpoints. The report generating system also includes means for generating a report comparing the received sensor signals with a plurality of desired checkpoint signals intended to be included in a predefined tour, wherein some of the checkpoint signals in the predefined tour are designated as higher priority checkpoints and others are designated as lower priority checkpoints. The report generating means also includes means for indicating in the report when the received sensor signals indicate that one of the higher priority checkpoints was missed. By dividing the checkpoints of the tour into higher and lower priority checkpoints and specifically flagging missed higher priority checkpoints, the report generating system of this invention allows supervisory personnel to monitor the performance of the guard or other user of the tour monitor more effectively.

The invention itself, together with further objects and attendant advantages, will best be understood by reference to the following detailed description, taken in conjunction with the accompanying drawings.

FIG. 1 is a block diagram of a tour monitor system that incorporates the presently preferred embodiment of this invention.

FIG. 2 is a plan view of the portable tour monitor of FIG. 1.

FIG. 3 is a plan view of a sample tour used for illustrative purposes.

FIG. 4 is a flow chart of the Start-up Routine executed by the tour monitor 30.

FIG. 5 is a flow chart of the Main Menu Routine executed by the tour monitor 30.

FIG. 6 is a flow chart of the Data Menu Routine executed by the tour monitor 30.

FIG. 7 is a flow chart of the Miscellaneous Menu Routine executed by the tour monitor 30.

FIG. 8 is a flow chart of the Begin Tour Routine executed by the tour monitor 30.

FIG. 9 is a flow chart of the Advance to Next Zone Routine executed by the tour monitor 30.

FIG. 10 is a flow chart of the Display Zones Routine executed by the tour monitor 30.

FIG. 11 is a flow chart of the Request Advance Routine executed by the tour monitor 30.

FIG. 12 is a flow chart of the Review Missed Must Scans Routine executed by the tour monitor 30.

FIG. 13 is a flow chart of the Process Scanned Checkpoint Routine executed by the tour monitor 30.

FIG. 14 is a flow chart of the program executed by the computer 12 of FIG. 1.

FIG. 15 is a flow chart of the Print History Reports Routine of FIG. 14.

FIG. 16 is a flow chart of the File Maintenance Routine of FIG. 14.

Turning now to the drawings, FIG. 1 shows a block diagram of a tour monitor system 10 that incorporates each of the five features of the invention outlined above. This system 10 includes a computer 12 which may for example be a conventional IBM compatible PC. The computer 12 is coupled to a conventional keyboard 14, monitor 16 and printer 18. As described in detail below in conjunction with FIGS. 14-16, the computer 10 incorporates both tour programming software 20 and report generating software 22.

The system 10 also includes at least one portable tour monitor 30. Each monitor 30 is a hand-held device which includes a keyboard 32, a display 34, a sensor such as a bar code reader 36, a computer 38 and a battery 40. A cable 42 can be used to interconnect the monitor 30 with the computer 12 when desired to transfer programming information from the computer 12 to the monitor 30, or to transmit a tour log back from the monitor 30 to the computer 12. When the tour monitor 30 is actually being carried through a tour, it is of course disconnected from a computer 12 and used as a stand alone unit.

A wide variety of portable computers can be used for the tour monitor 30, but the hand-held computer marketed under the tradename MICRO-WAND III by Hand Held Products, Inc. of Charlotte, N.C. has been found suitable. FIG. 2 shows a plan view of the preferred tour monitor 30. In this embodiment, the keyboard 32 is a full alphanumeric keyboard and the display 34 includes two sixteen-character lines, wherein each of the characters is formed of a respective dot matrix that allows any desired alphanumeric character to be displayed. A control button 37 is mounted on the side of the monitor 30 to activate the bar code reader 36.

The tour monitor 30 is used to record progress of an individual such as a guard through a tour such as a security guard tour. FIG. 3 shows a plan view of a building and will be used to outline the basic features of a highly simplified tour. The tour in this example is made up of two zones. Zone FLlA includes three separate checkpoints: entry door 50A, coffee pot 50B and window 50C. Zone FLlB includes four separate checkpoints: window 51A and doors 51B, 51C, 51D. Each of the checkpoints 50, 51 is marked with a respective checkpoint label, shown in a highly schematic form at 52. Each of the checkpoint labels 52 encodes a respective checkpoint code 54, which in this embodiment is a bar code. In actual use, the checkpoint labels 52 can be inconspicuous, adhesively secured strips. Preferably, the labels 52 are uniform in visual appearance. They can for example be conventional bar code labels that appear unfeatured to the naked eye so that they are not readily apparent as bar code labels.

Within the tour shown in FIG. 3, selected ones of the checkpoints 50, 51 are designated as higher priority checkpoints. For example, the coffee pot 50B and the doors 51C and 51D can be designated as higher priority checkpoints and the remaining checkpoints can be designated as lower priority checkpoints. As pointed out below, the tour monitor 30 is programmed to process these two different priorities of checkpoints differently.

In this preferred embodiment the zones of the tour are ordered. That is, the guard is intended to check Zone FLlA before he checks Zone FLlB. However, within any one zone, the individual checkpoints are unordered, and the guard is free to check them in any order that he desires. This increases flexibility and efficiency, because it may not always be convenient for a guard to check the checkpoints within a given zone in the same order. For example, a tour may be interrupted and it may be more convenient and efficient to resume the tour at some point within a zone other than that at which the tour was interrupted.

FIGS. 4-13 will be used to describe the operation of the tour monitor 30. The detailed discussion will then turn to the operation of the tour programming software 20 and the report generating software 22.

Prior to the start of any tour, the tour monitor 30 is programmed with a tour defining record that includes the following information:

1. The system date and time;

2. A password that can be used by a supervisor for various functions including programming the tour monitor 30 and transmitting a recorded log from the tour monitor 30 to the computer 12;

3. The number of the route defined by the tour defining record;

4. An ordered list of zone records, each zone record made up of a zone number and a zone name;

5. A list of checkpoint entries, each checkpoint entry including the zone number and the bar code of the respective checkpoint;

6. A list of higher priority checkpoint entries, each including the zone number, the bar code and the name of the respective checkpoint; and

7. A list of guard identification numbers.

As shown in FIG. 4, on start up the monitor 30 displays an initial operating system screen and then initializes various settings and functions and opens or creates appropriate files. The monitor 30 then checks to determine whether a route has been loaded. If not, control branches to the main menu routine of FIG. 5, where title screens are displayed on the display 34 and the routine waits for an appropriate key press. The key F3 causes execution of the Data Menu routine as shown in FIG. 6. Once the data menu has been displayed in the Data Menu routine, the routine then waits for appropriate key presses either to initiate the down loading of a tour defining record from the computer 12 to the monitor 30 or up loading of a log of tour data recorded by the monitor 30 from the monitor 30 to the computer 12.

When the F4 key is pressed in the main menu of FIG. 5, the monitor 30 executes the Miscellaneous Menu routine of FIG. 7. In the Miscellaneous Menu routine, a miscellaneous menu is displayed and the routine then waits for appropriate keys. In response to the F1 key, a battery check routine is executed. In response to the F4 key the monitor 30 will display bar codes scanned by the user to check operation of the bar code reader. The mode key can be used to return to the main menu of FIG. 5.

When it is desired to start a tour, the Fl key is pressed from the main menu of FIG. 5. This causes control to branch to a Begin Tour routine as shown in FIG. 8. In this routine, the monitor 30 checks to confirm that a route as defined by a tour defining record has been loaded. Once this has been confirmed HAND-OFF and TEMP-DATA are reset. The routine then waits for a guard ID to be input, either via the keys of the keyboard 32 or a scan from an appropriate bar code. Once a guard ID has been input the monitor 30 reviews the list of acceptable guard ID's included in the tour defining record. If the guard ID that was input cannot be found in this list, an error message is displayed and the routine waits for another guard ID to be input. Otherwise, the routine checks HAND-OFF. HAND-OFF is a variable which is set when one guard hands-off to another guard within a tour. If HAND-OFF is set, no further action is taken in the routine of FIG. 5. Otherwise, the initial records of the tour log are written into the memory of the monitor 30.

The tour log includes six different types of entries as shown in the following table:

TABLE 1
______________________________________
Record Type Log Data Time Stamp
______________________________________
Start Route Number Date, Time
Guard Guard ID Number
Date, Time
Enter Zone Zone Number Date, Time
Leave Zone Zone Number Date, Time
Read Bar Code Date, Time
Finish Route Number Date, Time
______________________________________

At the beginning of each tour, a Start record and a Guard record are entered into the log.

Once this has been accomplished, control is transferred to the Advance to Next Zone routine of FIG. 9. This routine first checks to determine whether this is the first zone of the tour. If not, a Leave Zone record is entered into the log. In any case, the routine then reads the next zone in the route and checks to determine whether the tour has been completed. If so, a tour complete message is displayed on the display 34 and a Finish record is entered into the log. The routine then shuts down the monitor 30 and awaits for a next key to be pressed.

Assuming that this is not the end of the tour, the routine then checks to see if HAND-OFF is set. If so, a Guard record is entered in the log and in any case an Enter Zone record is entered into the log and flags are cleared for all of the higher priority checkpoints in the new zone. These higher priority checkpoints are referred to as "must scan" checkpoints in the figures. Control is then transferred to the Display Zones routine of FIG. 10.

The Display Zones routine of FIG. 10 first checks TEMP-DATA. TEMP-DATA is a temporary storage location that is used to store a scanned bar code when the scanned bar code is outside of the current zone. Thus, TEMP-DATA will be equal to zero in the event the scanned bar code is inside the current zone. If TEMP-DATA is not equal to zero, TEMP-DATA is set equal to the scanned checkpoint variable and control is transferred to the Process Scanned Checkpoint routine of FIG. 13. Otherwise, HAND-OFF and TEMP-DATA are cleared and both the current zone and the next zone of the tour are displayed on the display 34. For example, when the guard enters Zone FLlA of FIG. 3, the display 34 is caused to display the messages "1ST FLOOR-W/1ST FLOOR-E". The routine then waits for the input of a bar code from the bar code reader 36 or a key input from the keyboard 32. If either the F1 or F4 key is pressed, control branches to the routines of FIGS. 11 and 12, respectively. If the mode key is pressed, the monitor 30 is shut down to wait for additional key inputs.

Assuming that a bar code has been scanned, the routine then checks for specific scanned codes. If the scanned code is equal to "ZZ", the routine stores an alphanumeric keyboard entry from the keyboard 32 and returns to the start of the Display Zones routine of FIG. 10. If the scanned code is equal to "YY", the routine confirms that the user is requesting a handoff, and then sets HAND-OFF and branches to node 11 of FIG. 8. If the scanned bar code is equal to "XX", the routine branches to the Request Advance routine of FIG. 11 if the guard is in the last zone, otherwise an error message is displayed and control is returned to the start of the Display Zones routine of FIG. 10.

Finally, if the scanned code is an incident code, the scanned code is simply written into the log as a Read entry before control is returned to the start of the Display Zones routine. Assuming that the scanned code is equal to none of the tested values, control branches to the Process Scanned Checkpoint routine of FIG. 13.

FIG. 11 shows the Request Advance routine that can be reached from the Display Zones routine of FIG. 10. This routine first checks to determine whether all of the higher priority or must scan checkpoints in the current zone have been scanned. If some of the must scan checkpoints have not be scanned, then an error message "MISSED MUST-SCAN/CANNOT ADVANCE/HIT F4 TO REVIEW/MISSED MUST-SCAN" is presented on the display 34 and control is returned to the Display Zones routine of FIG. 10. Otherwise HAND-OFF is checked. If it is set, control is transferred to node 11 of FIG. 8 to get the new guard ID. Otherwise, TEMP-DATA is checked. If it is not equal to zero (indicating that the scanned code is outside of the current zone), control is transferred to the Advance to Next Zone routine of FIG. 9. Similarly, if TEMP-DATA is equal to zero and the o.k. to advance test is met, control is transferred to the Advance to Next Zone of FIG. 9. Otherwise, control is returned to the Display Zones routine of FIG. 10.

FIG. 12 shows the Review Missed Must-Scans routine that is entered by use of the F4 key in the Display Zones routine of FIG. 10. The first step is to search for any higher priority or must scan checkpoints which were missed in the current zone. If there are no such checkpoints, a message is displayed ("END OF MUST-SCAN/POINTS THIS ZONE") and control is returned to the Display Zones routine of FIG. 10. Otherwise, the name of the missed must-scan checkpoint is displayed and the user is asked whether he wishes to skip this must scan checkpoint. If the received keyboard entry indicates the user wishes to skip the must scan checkpoint, then an appropriate message is displayed and the fact that the user or guard has provided an override signal to skip the checkpoint is recorded. The routine then finds the next missed must scan checkpoint and repeats the process.

FIG. 13 shows the Process Scanned Checkpoint routine that is called by the Display Zones routine of FIG. 10. The Process Scanned Checkpoint routine first determines whether the scanned bar code corresponds to one of the higher priority checkpoints in the current zone. If so, this higher priority checkpoint is indicated as having been scanned. Then TEMP-DATA is checked. If TEMP-DATA is not equal to zero the scanned bar code is date stamped and recorded in the log as a Read record, and TEMP-DATA is cleared before control is returned to the Display Zones routine of FIG. 10. If TEMP-DATA is equal to zero, the checkpoint corresponding to the most recently scanned bar code is checked to determine whether that checkpoint is in the current zone. If so, a Read record is recorded in the log. If the most recently scanned checkpoint is outside of the current zone, the routine then determines whether the scanned checkpoint is in the next zone. If not, an error message is displayed on the display 34 and a Read record is entered into the log before control is returned to the Display Zones routine of FIG. 10. If the scanned checkpoint is in the next zone, the scanned checkpoint is stored in TEMP-DATA and control branches to the Request Advance routine of FIG. 11.

Table 2 provides a sample log as created by the tour monitor 30 during a tour of the route illustrated in FIG. 3.

TABLE 2
______________________________________
SAMPLE LOG
LOG
ENTRIES
______________________________________
1 S R002 890113150622
2 G CEB 890113150622
3 E FL1A 890113150622
4 R F50A 890113151019
5 R F50B 890113151042
6 R F50C 890113151105
7 L FL1A 890113151210
8 E FL1B 890113151210
9 R F51A 890113151220
10 R ZZ 890113151235
11 R F51D 890113151350
12 L FL1B 890113151410
13 F R002 890113151410
MESSAGES
14 WINDOW OPEN
______________________________________

In Table 2, the route is designated ROO2. The checkpoint codes for checkpoints 50a-50c and 51a-51d are F50A-F50C and F51A-F51D, respectively. The date stamp is a twelve digit number in the form year-month-day-hour-minute-second. Note in the log of Table 2 that the guard has failed to scan the 51b and 51c checkpoints. Of these the 51c checkpoint is a higher priority, must scan checkpoint. Also at line 10 of the log the guard has scanned the bar code ZZ from a pocket reference card and then has entered the alphanumeric message "WINDOW OPEN", which is shown schematically at line 14.

A number of important operational features of the tour monitor 30 have been illustrated by the flowcharts of FIGS. 4-13. In particular, it should be noted that the monitor 30 displays on the display 34 both the name of the current zone and the name of the next zone in the tour. These zone identifying messages assist a new guard in conducting the tour in the order intended, and they also assist an experienced guard in learning a new tour.

Second, the monitor 30 is pre-programmed by the tour defining record for a tour made up of an ordered sequence of zones, wherein each zone includes a set of checkpoints that are not ordered within the set. This allows the guard to check the checkpoints within each zone in any order he desires while enforcing an overall sequence of zones in the tour.

Third, the checkpoints within each zone are designated as either higher priority (must scan) checkpoints or lower priority checkpoints. The monitor 30 does not take any action if lower priority checkpoints are not scanned during the tour. However, in the event any higher priority checkpoints are not scanned, the monitor 30 does not advance to the next zone until the guard has been reminded that the higher priority checkpoints were not scanned and the guard has indicated an intention to override this warning by skipping rather than scanning the missed checkpoints. This allows flexibility during the tour, because the guard can scan only a varying number of the lower priority checkpoints in each tour. Nevertheless, the guard is reminded that each of the higher priority checkpoints is to be scanned each tour. For example, potential fire sources such as coffee pots can be designated as higher priority checkpoints so that in each tour each coffee pot in a building is checked to ensure that it is unpowered and therefore not a fire hazard.

Another important advantage is that the monitor 30 allows the guard to record any desired alphanumeric message (within the allowed length) at any point within the tour. This is done by scanning a bar code that designates an alphanumeric message is to follow, and then entering the alphanumeric message via the keyboard 32. The keyboard 32 generates key signals which are then stored by the monitor in association with the bar codes of the log for later transmission to the computer 12. This feature provides an important degree of flexibility in the log which allows the guard to record unexpected events.

Turning now to FIGS. 14-16, the tour programming software 20 and the report generating software 22 of the computer 12 will now be described.

FIG. 14 shows an overall flowchart of the software of the computer 12. The software requires a password of the user and then after monthly maintenance displays a main menu and waits for a selection. As shown in FIG. 14 there are four basic sets of routines available to the user.

The first is a down-load routine that down-loads a tour defining record to the tour monitor 30. The tour defining record is of the type described above prior to the discussion of the program of FIG. 4, and it includes a route record which is created with the program of FIG. 16 described below.

The user can also select from the main menu an up-load routine that up-loads a completed tour log (as for example that shown in Table 2) from the tour monitor 30.

The letter "C" can be used to select processing routines that process a completed tour log and print a tour report. Table 3 is an example of a report that may, for example, be printed in response to the tour log of Table 2. This report provides a summary of the information included in the log, in a format that is readily understood by supervisory personnel.

TABLE 3
______________________________________
DETAIL ROUTE REPORT
______________________________________
Guard Name:
John Doe Check In: 1-13-89 15:06
Route Name:
Route No. 2
Check Out: 1-13-89 15:14
Total Time: 0 Hr. 8 Min.
Zones Checked:
2 of 2 Total In Zone
7
Points:
In Zones: 0 Hr. 8 Min.
In Zone Points
5
Checked:
Between Zones:
0 Hr. 0 Min.
Percent Checked:
71%
Must Scans 1
Missed:
______________________________________
Zone Check Bar Check Between
No. Point Code Time Time Incident
______________________________________
Check In 15:06
Enter Zone FL1A - 1st Floor-W
15:06 00:00
FL1A Suite 100- F50A 15:10 00:04
Kitchen
FL1A Coffee Pot F50B 15:11 00:01
FL1A Window F50C 15:11 00:00
Leave Zone
Enter Zone FL1B - 1st Floor-E
15:12 00:01
FL1B Hall Window
F51A 15:12 00:00 WINDOW
OPEN
! Suite 102 F51C
FL1B Hall Door F51D 15:14 00:02
Leave Zone 15:14 00:00
Check Out 15:14 00:00
______________________________________
* = Out of Zone
! = Missed Must Scan

Note in particular that for each checkpoint that was scanned during the tour the report includes a description of the checkpoint along with the checkpoint's zone number, bar code and the time the checkpoint was scanned. As shown in Table 3, the report is divided into sections corresponding to the separate zones of the tour. This allows supervisory personnel to focus on particular zones easily.

Another important feature of the report of Table 3 is that it includes the alphanumeric messages that were keyed by the guard after the bar code "ZZ" was scanned. Note, for example, the "WINDOW OPEN" message in the incident column.

A third important feature of the report of Table 3 is that higher priority checkpoints that were not scanned by the guard are highlighted, while missed lower priority checkpoints are not indicated. Note the exclamation point at the line associated with Suite 102, bar code F51C. The exclamation point indicates that the guard missed this higher priority checkpoint. Also, the header of the report summarizes the total number of higher priority or must-scan checkpoints which were missed.

By pressing the letter "D" in the main menu, the user can select the print history reports routine shown in FIG. 15. This routine first displays a history report menu and then waits for the user to select one of five possible history reports. For example, the system can be commanded to prepare and print reports summarizing the history of a particular guard, a particular zone or zones, a particular checkpoint or checkpoints, and incidents reported by guards. Finally, detailed history reports are also available.

By typing the letter "E" in the main menu of FIG. 14, the user can select the file maintenance routines shown in FIG. 16. The file maintenance routines allow the user to create, delete and edit entries in a guard ID file, a set of zone files, and a set of route files.

The guard ID file maintains a list of authorized guard codes. Once the guard ID file has been created and updated as necessary in the routine of FIG. 16, this file is included in the tour defining record (Item 7).

In the zone maintenance portion of the routine of FIG. 16 a user can create or delete a zone and add, delete or edit checkpoints within the zone. Within each zone, a bar code, description and must-scan flag are entered by the user to define each checkpoint of the zone. The bar code identifies the bar code associated with the checkpoint; the description is used by the tour monitor 30 in the event of a missed higher priority checkpoint and by the report generating software; the must scan flag designates the checkpoint as either a higher priority or a lower priority checkpoint. None, some, or all of the checkpoints within any zone can be designated as higher priority checkpoints. Each zone can be thought of as a set of checkpoints, and if desired a zone can have no checkpoints (the empty set). Such a zone is in effect merely a message displayed to the guard at a selected point in the tour.

The route maintenance portion of the routine of FIG. 16 allows the user to create and delete a route and to add and delete zones within a route.

Finally, the print data listing portion of the routine of FIG. 16 allows the user to print out a list of guards, zones and routes.

The file maintenance routine of FIG. 16 is used by a user first to create a number of zones. In the example of Route No. 2 shown in FIG. 3, the user creates two zones, FLlA and FLlB. For each checkpoint in each zone, the user enters the checkpoint bar code, description, and must-scan flag for that checkpoint.

The user then uses the route maintenance portion of the routine of FIG. 16 to actually create the route. In this case, the user merely indicates that Route 2 is to include zones FLlA and FLlB.

Individual zones may appear in more than one route or more than once in a route, and individual checkpoints may appear in more than one zone. This allows a high degree of flexibility in programming the tour monitor 30. For example, a user can change the order in which zones are inspected, or move individual zones from one route to another, simply and easily, without re-entering individual checkpoints. This flexibility is directly attributable to the fact that each route is a set of zones, and that each zone is a set of checkpoints. This arrangement has been found to simplify the programming of the tour monitor 30 when routes are being modified.

Simply by way of example in order better to define the presently preferred embodiment of this invention, Appendices 1-1 and 2-1 list the programs executed by the computer 12 and the tour monitor 30, respectively. Appendix 3-1 provides instructions for using these listings, and Appendices 1-2, 1-3 and 1-4 are also referenced in Appendix 3-1. In each case the listing is to be regarded as the primary disclosure of the presently preferred embodiment. In the event of any inconsistency between the listing and the flowcharts the listing is to govern. In the event of any inconsistency between the flowcharts and the written description, the flowcharts are to govern.

Of course, it should be understood that a wide range of changes and modifications can be made to the preferred embodiments described above. For example, this invention is not limited to use in security tours, but can readily be adapted for other types of tours such as the tours to inspect or perform janitorial activities such as housekeeping activities. Furthermore, this invention is not limited to the specific hardware used in the foregoing examples. For example, magnetic code readers, character recognition devices and the like can be substituted for the bar code reader described above. Furthermore, it is not essential in all embodiments that a cable 42 be used to interconnect the monitor 30 with the computer 12. A wide variety of communication approaches can be used, including modems, radios, and optical communication systems. In the event remote transmission capabilities are provided to the monitor 30, it is not essential that the log be stored in memory until the tour is completed prior to transmission of portions of the log back to the computer 12. Of course, a wide variety of reports can be generated utilizing the information transmitted from the monitor 30 to the computer 12.

It is therefore intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, which were intended to define the scope of this invention.

1-1 Source Code listings for Computer 12.

1-2 Instructions for creating TMMENU.EXE.

1-3 Instructions for creating TMMAINT.EXE.

1-4 File Structures for Computer 12.

2-1 Source Code listing for Tour Monitor 30.

3-1 Software Installation Instructions. ##SPC1##

Holland, Richard F., Coney, Jeffrey P.

Patent Priority Assignee Title
10013592, Jun 20 2006 ZONAR SYSTEMS, INC. Method and system for supervised disembarking of passengers from a bus
10056008, Jun 20 2006 ZONAR SYSTEMS, INC Using telematics data including position data and vehicle analytics to train drivers to improve efficiency of vehicle use
10223935, Jun 20 2006 ZONAR SYSTEMS, INC. Using telematics data including position data and vehicle analytics to train drivers to improve efficiency of vehicle use
10241966, Apr 01 2012 ZONAR SYSTEMS, INC. Method and apparatus for matching vehicle ECU programming to current vehicle operating conditions
10289651, Apr 01 2012 ZONAR SYSTEMS, INC. Method and apparatus for matching vehicle ECU programming to current vehicle operating conditions
10311272, Nov 09 2010 ZONAR SYSTEMS, INC. Method and system for tracking the delivery of an object to a specific location
10331927, Nov 09 2010 ZONAR SYSTEMS, INC. Method and system for supervised disembarking of passengers from a bus
10354108, Nov 09 2010 ZONAR SYSTEMS, INC. Method and system for collecting object ID data while collecting refuse from refuse containers
10360760, Jun 22 2012 Zonal Systems, LLC System and method for placing virtual geographic zone markers
10431020, Dec 02 2010 ZONAR SYSTEMS, INC. Method and apparatus for implementing a vehicle inspection waiver program
10431097, Jun 13 2011 ZONAR SYSTEMS, INC. System and method to enhance the utility of vehicle inspection records by including route identification data in each vehicle inspection record
10496961, May 26 2016 OP Hygiene IP GmbH Dispenser servicing in a multiple washroom facility
10572704, Nov 09 2010 ZONAR SYSTEMS, INC. Method and system for tracking the delivery of an object to a specific location
10600096, Nov 30 2010 ZONAR SYSTEMS, INC System and method for obtaining competitive pricing for vehicle services
10657768, Jun 22 2012 Zonal Systems, LLC System and method for placing virtual geographic zone markers
10665040, Aug 27 2010 ZONAR SYSTEMS, INC Method and apparatus for remote vehicle diagnosis
10672226, Jun 22 2012 Zonal Systems, LLC Method for authenticating a wager using a system and method for interacting with virtual geographic zones
10706647, Dec 02 2010 ZONAR SYSTEMS, INC. Method and apparatus for implementing a vehicle inspection waiver program
11080950, Aug 27 2010 ZONAR SYSTEMS, INC. Cooperative vehicle diagnosis system
11341853, Sep 11 2001 ZONAR SYSTEMS, INC. System and method to enhance the utility of vehicle inspection records by including route identification data in each vehicle inspection record
5399844, Jan 12 1993 BRADY WORLDWIDE, INC Inspection prompting and reading recording system
5426284, Dec 12 1990 ENGINEERED DATA PRODUCTS HOLDINGS INC ; ENGINEERED DATA PRODUCTS HOLDINGS, LLC Apparatus for locating and tracking information storage items using predefined labels
5523737, Oct 23 1992 Universal intelligent group guidance system and method
5867823, Sep 15 1995 The Butcher Company, Inc. Retail center analysis and instruction system
6831563, Mar 20 2001 Meta Platforms, Inc Location visit confirmation services for wireless devices
6834259, Oct 15 1999 TIMEKEEPING SYSTEMS, INC Guard tour system
7027955, Oct 15 1999 TimeKeeping Systems, Inc. Guard tour system incorporating a positioning system
7123152, Mar 20 2001 Meta Platforms, Inc Location visit confirmation services for wireless devices
7284689, May 01 2000 Light fixture management system
7286048, Jun 12 2002 U S SECURITY ASSOCIATES HOLDING CORP Supervised guard tour systems and methods
7289023, Jun 12 2002 U S SECURITY ASSOCIATES, INC Supervised guard tour tracking systems and methods
7292865, Mar 20 2001 Meta Platforms, Inc Location visit detail services for wireless devices
7385516, Mar 20 2001 Meta Platforms, Inc Location visit confirmation services for wireless devices
7404520, Apr 28 2004 Symbol Technologies, LLC System and method for providing location information in transaction processing
7503478, May 01 2000 Light fixture management system
7532125, Aug 30 2004 Nokia Technologies Oy System and method for worker supervision
7694331, Apr 01 2005 NXP B V Phone with secure element and critical data
7808369, Sep 11 2001 ZONAR SYSTEMS, INC. System and process to ensure performance of mandated inspections
7944345, Sep 11 2001 ZONAR SYSTEMS, INC. System and process to ensure performance of mandated safety and maintenance inspections
8106757, Sep 11 2001 ZONAR SYSTEMS, INC. System and process to validate inspection data
8400296, Sep 11 2001 ZONAR SYSTEMS, INC. Method and apparatus to automate data collection during a mandatory inspection
8736419, Dec 02 2010 ZONAR SYSTEMS, INC Method and apparatus for implementing a vehicle inspection waiver program
8810385, Sep 11 2001 ZONAR SYSTEMS, INC System and method to improve the efficiency of vehicle inspections by enabling remote actuation of vehicle components
8972179, Jun 20 2006 ZONAR SYSTEMS, INC Method and apparatus to analyze GPS data to determine if a vehicle has adhered to a predetermined route
9230437, Jun 20 2006 ZONAR SYSTEMS, INC Method and apparatus to encode fuel use data with GPS data and to analyze such data
9317996, Jun 22 2012 Zonal Systems, LLC Method for authenticating a wager using a system and method for interacting with virtual geographic zones
9319834, Jun 22 2012 Zonal Systems, LLC System and method for providing automatic supervision of employees using virtual geographic zones
9443357, Jul 11 2011 GOJO Industries, Inc. Dispenser use monitor
9786176, Jun 22 2012 Zonal Systems, LLC System and method for placing virtual geographic zone markers
9858462, Jun 20 2006 ZONAR SYSTEMS, INC. Method and system for making deliveries of a fluid to a set of tanks
Patent Priority Assignee Title
3736561,
3791945,
3990067, Sep 30 1974 Borg-Warner Security Corporation Electronic security tour system
4296408, Apr 14 1980 PORTRONIX COMMUNICATIONS INC Location transmitting system
4628193, Jan 30 1980 Becton Dickinson and Company Code reading operations supervisor
4688026, May 15 1984 Method of collecting and using data associated with tagged objects
4801786, May 25 1984 Checking system and method for verifying checking stations in a monitoring system
4850009, May 12 1986 MCKESSON INFORMATION SOLUTIONS INC Portable handheld terminal including optical bar code reader and electromagnetic transceiver means for interactive wireless communication with a base communications station
GB2156128,
GB2161967,
////////////////////////////////////////////////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jan 30 1989HOLLAND, RICHARD F COMPUTER SYSTEMS DESIGN, INC , CHICAGO, IL, A CORP OF ILASSIGNMENT OF ASSIGNORS INTEREST 0050370924 pdf
Feb 02 1989Computer Systems Design Inc.(assignment on the face of the patent)
Mar 31 1989COMPUTER SYSTEMS DESIGN, INC CHANGED INTO FACILITY MANAGEMENT SYSTEMS, INC CHANGE OF NAME SEE DOCUMENT FOR DETAILS EFFECTIVE ON 05 12 19890057910195 pdf
Jul 26 1996FACILITY MANAGMENT SYSTEMS,INC FMS ACQUISITION CORP MERGER SEE DOCUMENT FOR DETAILS 0106550820 pdf
Jul 26 1996FMS ACQUISITION CORP FACILITY MANAGEMENT SYSTEMS, INC CHANGE OF NAME SEE DOCUMENT FOR DETAILS 0106550793 pdf
Jan 31 1997FACILITY MANAGEMENT SYSTEMS, INC INNOVATIVE TECH SYSTEMS, INC OF DELAWARECHANGE OF NAME SEE DOCUMENT FOR DETAILS 0106550800 pdf
Jan 26 1998INNOVATIVE TECH SYSTEMS, INC , OF DELAWAREINNOVATIVE TECH SYSTEMS, INC MERGER SEE DOCUMENT FOR DETAILS 0106550804 pdf
Jul 30 1998INNOVATIVE TECH SYSTEMS, INC PEREGRINE SYSTEMS FACILITIES MANAGEMENT, INC MERGER CHANGE OF NAME0106550825 pdf
Mar 25 1999PEREGRINE SYSTEMS FACILITIES MANAGEMENT, INC PEREGRINE FEDERAL SYSTEMS, INC CHANGE OF NAME SEE DOCUMENT FOR DETAILS 0106550787 pdf
Jun 30 1999PEREGRINE SYSTEMS, INC TISCORASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0128130658 pdf
Jun 30 1999PEREGRINE FEDERAL SYSTEMS, INC PEREGRINE SYSTEMS, INC ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0106550842 pdf
Jun 12 2002OCTOBER ACQUISITION CORPORATIONFOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002HARBINGER HOLDINGS, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002Loran Network Systems, LLCFOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE SYSTEMS, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE FEDERAL SYSTEMS, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE REMEDY, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE E-MARKETS, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002TELCO RESEARCH CORPORATIONFOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002BALLGAME ACQUISITION CORPORATIONFOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE CALIFORNIA PADRES, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE ONTARIO BLUE JAYS, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE BODHA, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE DIAMOND, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Jun 12 2002PEREGRINE CONNECTIVITY, INC FOOTHILL CAPITAL CORPORATION, AS AGENTSECURITY AGREEMENT0130000757 pdf
Aug 26 2002Loran Network Systems, LLCFLEET BUSINESS CREDIT, LLCSECURITY INTEREST SEE DOCUMENT FOR DETAILS 0132800917 pdf
Aug 26 2002PEREGRINE FEDERAL SYSTEMS, INC FLEET BUSINESS CREDIT, LLCSECURITY INTEREST SEE DOCUMENT FOR DETAILS 0132800917 pdf
Aug 26 2002OCTOBER ACQUISITION CORPORATIONFLEET BUSINESS CREDIT, LLCSECURITY INTEREST SEE DOCUMENT FOR DETAILS 0132800917 pdf
Aug 26 2002PEREGRINE SYSTEMS, INC FLEET BUSINESS CREDIT, LLCSECURITY INTEREST SEE DOCUMENT FOR DETAILS 0132800917 pdf
Aug 26 2002PEREGRINE REMEDY, INC FLEET BUSINESS CREDIT, LLCSECURITY INTEREST SEE DOCUMENT FOR DETAILS 0132800917 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE CALIFORNIA PADRES, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE DIAMOND, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE CONNECTIVITY, INC , A GEORGIA CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONTELCO RESEARCH CORPORATION, A TENNESSEE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE E-MARKETS, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONHARBINGER HOLDINGS, INC , A CALIFORNIA CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE REMEDY, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE SYSTEMS, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE SYSTEMS, INC RELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE ONTARIO BLUE JAYS, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONBALLGAME ACQUISITION CORPORATION, A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONOCTOBER ACQUISITION CORPORATION, A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE BODHA, INC , A DELAWARE CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONPEREGRINE FEDERAL SYSTEMS, INC , AN ILLINOIS CORPORATIONRELEASE BY SECURED PARTY0142680705 pdf
Dec 30 2002FOOTHILL CAPITAL CORPORATIONLORAN NETWORK SYSTEMS, LLC, A DELAWARE LIMITED LIABILITY COMPANYRELEASE BY SECURED PARTY0142680705 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCOCTOBER ACQUISITION CORPORATIONRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCKNOWLIX CORPORATIONRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCPEREGRINE FEDERAL SYSTEMS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCLoran Network Systems, LLCRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCPEREGRINE SYSTEMS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Jan 14 2004FLEET BUSINESS CREDIT, LLCPEREGRINE REMEDY, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0152230827 pdf
Aug 01 2005TISCORBRADY WORLDWIDE, INC MERGER SEE DOCUMENT FOR DETAILS 0172620360 pdf
Date Maintenance Fee Events
Aug 14 1995M283: Payment of Maintenance Fee, 4th Yr, Small Entity.
Aug 29 1995ASPN: Payor Number Assigned.
Nov 22 1999M284: Payment of Maintenance Fee, 8th Yr, Small Entity.
Sep 26 2003M1553: Payment of Maintenance Fee, 12th Year, Large Entity.
Nov 28 2003R2553: Refund - Payment of Maintenance Fee, 12th Yr, Small Entity.
Nov 28 2003STOL: Pat Hldr no Longer Claims Small Ent Stat
Jan 12 2004ASPN: Payor Number Assigned.
Jan 12 2004RMPN: Payer Number De-assigned.


Date Maintenance Schedule
Jun 09 19954 years fee payment window open
Dec 09 19956 months grace period start (w surcharge)
Jun 09 1996patent expiry (for year 4)
Jun 09 19982 years to revive unintentionally abandoned end. (for year 4)
Jun 09 19998 years fee payment window open
Dec 09 19996 months grace period start (w surcharge)
Jun 09 2000patent expiry (for year 8)
Jun 09 20022 years to revive unintentionally abandoned end. (for year 8)
Jun 09 200312 years fee payment window open
Dec 09 20036 months grace period start (w surcharge)
Jun 09 2004patent expiry (for year 12)
Jun 09 20062 years to revive unintentionally abandoned end. (for year 12)